First published: Tue Oct 05 2021(Updated: )
A stored Cross-Site Scripting vulnerability in the GitLab Flavored Markdown in GitLab CE/EE version 8.4 and above allowed an attacker to execute arbitrary JavaScript code on the victim's behalf.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.4.0<14.1.7 | |
GitLab | >=8.4.0<14.1.7 | |
GitLab | >=14.2<14.2.5 | |
GitLab | >=14.2<14.2.5 | |
GitLab | >=14.3<14.3.1 | |
GitLab | >=14.3<14.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39887 is classified as a moderate severity vulnerability due to its impact on user data.
To fix CVE-2021-39887, upgrade GitLab to version 14.1.7 or later, or apply the relevant patches provided by GitLab.
CVE-2021-39887 can facilitate stored Cross-Site Scripting (XSS) attacks, allowing attackers to execute arbitrary JavaScript on victim users.
CVE-2021-39887 affects GitLab CE/EE versions from 8.4.0 up to but not including 14.1.7, among other versions.
Yes, user data may be at risk due to malicous scripts being executed in the context of the user's browser.